共查询到20条相似文献,搜索用时 15 毫秒
1.
Andrew Fano 《Personal and Ubiquitous Computing》2001,5(1):12-15
The promise of mobile devices lies not in their capacity to duplicate the capabilities of desktop machines, but rather in
their promise of enabling location-specific tasks. One of the challenges that must be addressed if they are to be used in
this way is how intuitive interfaces for mobile devices can be designed that enable access to location-specific services usable
across locations. We are developing a prototype mobile valet application that presents location-specific services organised
around the tasks associated with a location. The basic elements of the interface exploits commonalties in the way we address
tasks at various locations just as the familiar “file” and “edit” menus in various software applications exploit regularities
in software tasks. 相似文献
2.
This paper provides empirical results concerning the negotiation of access and joinability by mobile phone users. It shows
how access is embedded in a gift-giving economy (giving one’s number for example). It also shows that the more users make
themselves available on the mobile phone, the more their mobile phone traffic increases (both incoming and outgoing). This
remarkable result is discussed in terms of the reciprocity involved in the management of mobile phone relationships. 相似文献
3.
A major contributor to the failure of information technology-based systems is the problem of understanding user or customer
requirements in the initial analysis and requirements identification stage of development. This paper identifies and describes
an approach to help overcome some of these problems, particularly the mismatch or understanding gap between the customer and
the developer. The approach is intended to be used at the early stages of requirement determination and introduces techniques
from operational research into the process. In particular set theory and Venn diagrams are used as a way of graphically representing
the relationships and gaps in understanding that may exist. The benefit obtained from the use of the technique is partly in
the graphical representations themselves but mainly in the dialogue and negotiation that result from the construction of the
diagrams. The technique has been developed in a research study of retail organisations’ use of information technology in the
UK and an example case study from the sector is used to illustrate and discuss the technique. 相似文献
4.
Overcoming the Lack of Screen Space on Mobile Computers 总被引:5,自引:0,他引:5
Stephen Brewster 《Personal and Ubiquitous Computing》2002,6(3):188-205
One difficulty for interface design on mobile computers is lack of screen space caused by their small size. This paper describes
a small pilot study and two formal experiments that investigate the usability of sonically-enhanced buttons of different sizes.
The underlying hypothesis being that presenting information about the buttons in sound would increase their usability and
allow their size to be reduced. An experimental interface was created that ran on a 3Com Palm III mobile computer and used
a simple calculator-style interface to enter data. The buttons of the calculator were changed in size between 4×4, 8×8 and
16×16 pixels and used a range of different types of sound from basic to complex. Results showed that sounds significantly
improved usability for both standard and small button sizes – more data could be entered with sonically-enhanced buttons and
subjective workload reduced. More sophisticated sounds that presented more information about the state of the buttons were
shown to be more effective than the standard Palm III sounds. The results showed that if sound was added to buttons then they
could be reduced in size from 16×16 to 8×8 pixels without much loss in quantitative performance. This reduction in size, however,
caused a significant increase in subjective workload. Results also showed that when a mobile device was used in a more realistic
situation (whilst walking outside) usability was significantly reduced (with increased workload and less data entered) than
when used in a usability laboratory. These studies show that sound can be beneficial for usability and that care must be taken
to do testing in realistic environments to get a good measure of mobile device usability. 相似文献
5.
Patterns of Mobile Interaction 总被引:1,自引:0,他引:1
Jörg Roth 《Personal and Ubiquitous Computing》2002,6(4):282-289
The design of systems for mobile scenarios covers a wide range of issues, ranging from mobile networking to user interface
design for mobile devices. Mobile applications often run distributed on several connected devices, used by many users simultaneously.
Considering all issues related to mobile scenarios, a designer might be overwhelmed. As a solution, we propose a specific
kind of design patterns which we call mobility patterns, derived from successful mobile applications. They allow a designer to re-use design elements as building blocks in their
own designs. After describing the idea of mobility patterns, we give a brief overview of patterns we have identified so far.
Two patterns are described in more detail with the help of our research platforms QuickStep and Pocket DreamTeam. 相似文献
6.
Peter Coschurba Joachim Baumann Uwe Kubach Alexander Leonhardi 《Personal and Ubiquitous Computing》2001,5(1):16-19
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor
is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users
of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore,
we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our
considerations with a classification of new and existing metaphors using our taxonomy. 相似文献
7.
8.
Constantine Stephanidis Anthony Savidis 《Universal Access in the Information Society》2001,1(1):40-55
Accessibility and high quality of interaction with products, applications, and services by anyone, anywhere, and at any time are fundamental requirements
for universal access in the emerging Information Society. This paper discusses these requirements, and their relation to the concept of automated
adaptation of user interfaces. An example application is presented, showing how adaptation can be used to accommodate the
requirements of different user categories and contexts of use. This application is then used as a vehicle for discussing a
new engineering paradigm appropriate for the development of adaptation-based user interfaces. Finally, the paper investigates
issues concerning the interaction technologies required for universal access.
Published online: 23 May 2001 相似文献
9.
Configuring the Mobile User: Sociological and Industry Views 总被引:2,自引:2,他引:0
This article considers the role of the consumer in the diffusion of mobile telecommunications technologies. There is presently
little research on the consumption and use of mobile technologies, and the aim of the present paper is to facilitate discussion
about the way consumer behaviour is currently understood in industry and academia. The paper considers key themes in social
science research on mobile ICTs, and understandings of the consumer held by those in the mobile industry. Bringing these understandings
together, we reiterate the now well attested view that the diffusion and consumption of mobile telephony and computing cannot
be understood without investigating the contexts and processes of their use in everyday life. 相似文献
10.
Context Awareness and Mobile Phones 总被引:1,自引:1,他引:0
Peter Ljungstrand 《Personal and Ubiquitous Computing》2001,5(1):58-61
This paper investigates some aspects of how context-awareness can support users of mobile phones, in particular the calling
party. The use of mobile and stationary phones is discussed in relation to situational properties of a phone conversation,
especially with regards to who might benefit from context-awareness in this context. An initial hypothesis is that mobile
phone users communicate context information to each other (verbally) to a much higher degree than do stationary phone users.
Mobile phone users could benefit much from context awareness technology, in particular when about to make a call, if they
can receive context information regarding the person they are trying to reach prior to establishing the call. We argue that
such technology should require low amounts of explicit user interaction, and could lead to less disrupting calls in inappropriate
moments, as well as less frustration for the calling party when a call is not answered. 相似文献
11.
Leopoldina Fortunati 《Personal and Ubiquitous Computing》2001,5(2):85-98
This paper analyses the shifting identity of the mobile phone in the light of research carried out in 1996 on a representative
population sample from five major European countries: Italy, UK, France, Germany and Spain. A total of 6609 people were interviewed
by means of a telephone survey. The mobile phone emerged as a charismatic technology compared to other mobile technologies
(laptop and car phone) and as a leading technology that, in just a few years, has appropriated 11% of total telephone traffic.
It has “dragged” its widespread presence and amount of use from the workplace to the domestic sphere, although in Italy, where
it has had greatest success, its widespread use has been detached from its use in the workplace. Another emerging result is
that the use of the mobile phone is not correlated to strong residential mobility in individuals. 相似文献
12.
User and Concept Studies as Tools in Developing Mobile Communication Services for the Elderly 总被引:1,自引:0,他引:1
M. Mikkonen S. Va¨yrynen V. Ikonen M. O. Heikkila¨ 《Personal and Ubiquitous Computing》2002,6(2):113-124
The basis of this study was the ageing of the population all over the world. The study concentrated on finding out the key
service needs of elderly people. The service needs from the end users’ as well as the experts’ perspective were gathered by
means of various group methods such ideation sessions. Four mobile communication service concepts were created using these
groups’ opinions. After diverse communication, these concepts were tested by the elderly. The research methods comprised a
user study and a concept study.
Based on the results, the needs could be prioritised. Additionally, the main trend of the results confirmed the opinions
presented in the literature. One important finding was the positive opinions about additional value of wireless devices and
services. This knowledge can be used in mobile communication product development. Most of the elderly are ready to accept
new forms of mobile communication service. Ease of use and actual need of the services are important criteria. The elderly
are ready to begin using the services as long as they truly facilitate independent living. 相似文献
13.
Alexandra Weilenmann 《Personal and Ubiquitous Computing》2001,5(2):137-145
This paper is based on a study of the ways in which a group negotiated the use of a new mobile technology. The group was
made up of ski instructors who, during a one-week ski trip, were equipped with a mobile awareness device called the Hummingbird.
The group was studied using ethnomethodologically inspired qualitative methods, with the focus on the group members’ different
views of the Hummingbird’s intended use. Negotiations of use occurred using two methods: talk and action. The users negotiated issues such as where and when to use the technology, and whether to consider the Hummingbird a work tool or a gadget for social events. Further, the empirical
results clearly show how negotiations of new, mobile technology differ from stationary technology. 相似文献
14.
Rich Ling 《Personal and Ubiquitous Computing》2001,5(2):123-136
This paper examines the social meaning behind the adoption of mobile telephones by teenagers in Norway. Through this adoption
process one can see the way in which youths are developing their adult identity as well as their gendered identity. The primary
database used in this analysis is from two telephone questionnaires of Norwegian youth aged 13–20 carried out in October and
December 1998. A total of 2007 interviews are included. The survey instrument covered teenagers’ ownership of mobile telephones,
payment forms and the use of mobile telephones to send and receive Short Message System (SMS) text messages. In addition,
the analysis draws on a survey of 1001 Norwegian parents and ethnographic interviews of 12 families. 相似文献
15.
Georg Strom 《Personal and Ubiquitous Computing》2002,6(4):307-310
Mobile devices such as cameras or mobile phones can be used as props; actively to convey a specific impression to people
in the vicinity and to feel better when interacting with them. Based on field studies and interviews, three aspects of users
acting with mobile devices are described: warm versus cold devices; how a mobile device conveys a specific impression by association
to similar devices and specific situations of use; and how the characteristics of a mobile device may open or restrict the
body language of the user. 相似文献
16.
Ashish Mehta James Geller Yehoshua Perl Erich Neuhold 《The VLDB Journal The International Journal on Very Large Data Bases》1998,7(1):25-47
A path-method is used as a mechanism in object-oriented databases (OODBs) to retrieve or to update information relevant to one class that
is not stored with that class but with some other class. A path-method is a method which traverses from one class through
a chain of connections between classes and accesses information at another class. However, it is a difficult task for a casual
user or even an application programmer to write path-methods to facilitate queries. This is because it might require comprehensive
knowledge of many classes of the conceptual schema that are not directly involved in the query, and therefore may not even
be included in a user's (incomplete) view about the contents of the database. We have developed a system, called path-method generator (PMG), which generates path-methods automatically according to a user's database-manipulating requests. The PMG offers the
user one of the possible path-methods and the user verifies from his knowledge of the intended purpose of the request whether
that path-method is the desired one. If the path method is rejected, then the user can utilize his now increased knowledge
about the database to request (with additional parameters given) another offer from the PMG. The PMG is based on access weights attached to the connections between classes and precomputed access relevance between every pair of classes of the OODB. Specific rules for access weight assignment and algorithms for computing access
relevance appeared in our previous papers [MGPF92, MGPF93, MGPF96]. In this paper, we present a variety of traversal algorithms
based on access weights and precomputed access relevance. Experiments identify some of these algorithms as very successful
in generating most desired path-methods. The PMG system utilizes these successful algorithms and is thus an efficient tool
for aiding the user with the difficult task of querying and updating a large OODB.
Received July 19, 1993 / Accepted May 16, 1997 相似文献
17.
Sunil Prabhakar Divyakant Agrawal Amr El Abbadi Ambuj Singh Terence Smith 《Multimedia Systems》2003,8(6):459-469
Abstract. With rapid advances in computer and communication technologies, there is an increasing demand to build and maintain large
image repositories. To reduce the demands on I/O and network resources, multi-resolution representations are being proposed
for the storage organization of images. Image decomposition techniques such as wavelets can be used to provide these multi-resolution images. The original image is represented by several coefficients, one of them
with visual similarity to the original image, but at a lower resolution. These visually similar coefficients can be thought
of as thumbnails or icons of the original image. This paper addresses the problem of storing these multi-resolution coefficients on disks so that thumbnail
browsing as well as image reconstruction can be performed efficiently. Several strategies are evaluated to store the image
coefficients on parallel disks. These strategies can be classified into two broad classes, depending on whether the access
pattern of the images is used in the placement. Disk simulation is used to evaluate the performance of these strategies. Simulation
results are validated with results from experiments with real Disks, and are found to be in good qualitative agreement. The
results indicate that significant performance improvements can be achieved with as few as four disks by placing image coefficients
based upon browsing access patterns.
Work supported by a research grant from NSF/ARPA/NASA IRI9411330 and NSF instrumentation grant CDA-9421978 and NSF Career
grant No. IIS-9985019, and NSF grant 0010044-CCR. 相似文献
18.
Structured document storage and refined declarative and navigational access mechanisms in HyperStorM 总被引:2,自引:0,他引:2
Klemens Böhm Karl Aberer Erich J. Neuhold Xiaoya Yang 《The VLDB Journal The International Journal on Very Large Data Bases》1997,6(4):296-311
The combination of SGML and database technology allows to refine both declarative and navigational access mechanisms for
structured document collection: with regard to declarative access, the user can formulate complex information needs without
knowing a query language, the respective document type definition (DTD) or the underlying modelling. Navigational access is
eased by hyperlink-rendition mechanisms going beyond plain link-integrity checking. With our approach, the database-internal
representation of documents is configurable. It allows for an efficient implementation of operations, because DTD knowledge
is not needed for document structure recognition. We show how the number of method invocations and the cost of parsing can
be significantly reduced.
Edited by Y.C. Tay. Received April 22, 1996 / Accepted March 16, 1997 相似文献
19.
E. Pontelli D. Gillan G. Gupta A. Karshmer E. Saad W. Xiong 《Universal Access in the Information Society》2002,2(1):56-69
This paper provides an overview of a project aimed at using knowledge-based technology to improve accessibility of the Web
for visually impaired users. The focus is on the multi-dimensional components of Web pages (tables and frames); our cognitive
studies demonstrate that spatial information is essential in comprehending tabular data, and this aspect has been largely
overlooked in the existing literature. Our approach addresses these issues by using explicit representations of the navigational semantics of the documents and using a domain-specific language to query the semantic representation and derive navigation strategies. Navigational knowledge is explicitly generated and
associated to the tabular and multi-dimensional HTML structures of documents. This semantic representation provides to the
blind user an abstract representation of the layout of the document; the user is then allowed to issue commands from the domain-specific
language to access and traverse the document according to its abstract layout.
Published online: 6 November 2002 相似文献
20.
Ning An Sudhanva Gurumurthi Anand Sivasubramaniam Narayanan Vijaykrishnan Mahmut Kandemir Mary Jane Irwin 《The VLDB Journal The International Journal on Very Large Data Bases》2002,11(3):179-197
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious
design is important at all levels of system architecture, and the software has a key role to play in conserving battery energy
on these devices. With the increasing popularity of spatial database applications, and their anticipated deployment on mobile
devices (such as road atlases and GPS-based applications), it is critical to examine the energy implications of spatial data
storage and access methods for memory resident datasets. While there has been extensive prior research on spatial access methods
on resource-rich environments, this is, perhaps, the first study to examine their suitability for resource-constrained environments.
Using a detailed cycle-accurate energy estimation framework and four different datasets, this paper examines the pros and
cons of three previously proposed spatial indexing alternatives from both the energy and performance angles. Specifically,
the Quadtree, Packed R-tree, and Buddy-Tree structures are evaluated and compared with a brute-force approach that does not
use an index. The results show that there are both performance and energy trade-offs between the indexing schemes for the
different queries. The nature of the query also plays an important role in determining the energy-performance trade-offs.
Further, technological trends and architectural enhancements are influencing factors on the relative behavior of the index
structures. The work in the query has a bearing on how and where (on a mobile client or/and on a server) it should be performed
for performance and energy savings. The results from this study will be beneficial for the design and implementation of embedded
spatial databases, accelerating their deployment on numerous mobile devices.
Received: November 11, 2001 / Accepted: March 12, 2002 Published online: November 14, 2002
This paper is a significantly extended version of preliminary work that appeared in the Proceedings of the Very Large Databases
(VLDB) 2001 Conference. The extensions include (i) a comparison of indexing alternatives carrying out the operations in a
brute-force manner; (ii) observations showing that datasets do play a role in power consumption; (iii) architectural solutions
to address the cache and memory hotspots for energy; and (iv) benefits when off-loading the work to a server over a wireless
medium compared to doing everything on the handheld device. 相似文献